Your search returned 210 results.

Sort
Results
1.
Security architecture for open distributed systems /Sead Muftic (...) by
  • Muftic, Sead
  • Patel, Ahmed
  • Sandres, Peter
Series: Wiley Series in Communication and Distributed Systems
Material type: Text Book
Publication details: Chichester JW 1993
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N93.

2.
Cryptography and secure communications /Man Young Rhee by
  • Rhee, Man Young
Series: McGraw-Hill Series in Computer Communications
Material type: Text Book
Publication details: Singapore McGraw-Hill 1994
Availability: Items available for reference: Electrical Communication Engineering: Not for loan (1)Call number: 005.8 N94.

3.
Database security /Silvana Castano, Mariagrazia Fugini, (...) by
  • Castano, Silvana
  • Fugini, Mariagrazia
  • Martella, Giancarlo
Material type: Text Book
Publication details: Wokingham A-W 1994
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N941.

4.
Information security: an integrated collection of essays by
  • ed. by Marshall D Abrams, Sushil Jajodia and Harold J Podell
  • Abrams, Marshall D., ed
  • Jajodia, Sushil
  • Podell, Harold J
Material type: Text Book
Publication details: Los Alamitos IEEE Comp. Soc. Pr. 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N95.

5.
Unix system security: how to protect your data and prevent intruders by
  • Rik Farrow
  • Farrow, Rik
Material type: Text Book
Publication details: Reading, Mass Addison-Wesley 1991
Availability: Items available for reference: Supercomputer Education and Research Centre: Not for loan (1)Call number: 005.8 N91.

6.
Network and internetwork security principles and practice by
  • by William Stallings
  • Stallings, William
Material type: Text Book
Publication details: Englewood Cliffs Prentice-Hall 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N953.

7.
Building in big brother: the cryptographic policy debate /ed. by Lance J Hoffman by
  • Hoffman, Lance J
Material type: Text Book
Publication details: New York S-V 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 363.252 N95.

8.
Information Security : An Integrated Collection of Essays ed. by Marshall D Abrams, Sushil Jajodia and Harold J Podell by
  • Abrams, Marshall D., ed
  • Jajodia, Sushil., ed
  • Podell, Harold J., ed
Material type: Text Book
Publication details: Washington IEEE 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.8 N95;1.

9.
Security solutions in vector-criterion games - concepts, theory, and applications by N. Sashishekhar by
  • Shashishekhar, N
Series: IISc, Dept. of Computer Science and Automation, PhD thesis
Material type: Text Book
Publication details: Bangalore IISc 1995
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 519.302858 N95 "THESIS".

10.
Computer security by Peter Hamilton by
  • Hamilton, Peter
Material type: Text Book
Publication details: London Associated Business Programs 1972
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 658.478 N72.

11.
Technology assessment Methods for measuring the level of computer security by William Neugent,[et al] by
  • Neugent, William.[et al]
Series: Computer science and technology
Material type: Text Book
Publication details: Washington U.S.Department of Commerce 1985
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 001.64044 N855.

12.
Aerospace computer security applications by
  • IEEE Aerospace Computer Security Applications conference ( 4th 1988
Material type: Text Book
Publication details: New York IEEE 1988
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.1 N889.

13.
Java security : Hostile Applets, Holes, and Antidotes by Gary McGraw and Edward W Felten by
  • McGraw, Gary,
  • Felten, Edward W
Material type: Text Book
Publication details: New York John-Wiley 1997
Availability: Items available for reference: Supercomputer Education and Research Centre: Not for loan (1)Call number: 005.8 MCG.

14.
Applied cryptography Protocols, algorithms and source code in C by Bruce Schneier by
  • Schneier, Bruce
Edition: 2nd ed.
Material type: Text Book
Publication details: New York J-W 1996
Availability: Items available for reference: Electrical Communication Engineering: Not for loan (1)Call number: 005.82 N96;1.

15.
Trust, complexity and control confidence in a convergent world by Piotr Cofta by
  • Cofta, Piotr
Material type: Text Book
Publication details: England John Wiley and sons 2007
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P071.

16.
Applied cryptography, protocols, algorithms and source code in C by Bruce Schneier by
  • Schneier, Bruce
Edition: 2nd
Material type: Text Book
Publication details: New York Wiley 1996
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.82 N96;2.

17.
Applied cryptography Protocols, algorithms, and source code in C by Bruce Schneier by
  • Schneier, Bruce
Edition: 2nd ed.
Material type: Text Book
Publication details: New York John Wiley 1996
Availability: Items available for reference: Computer Science and Automation: Not for loan (1)Call number: 005.82 N96;3 (CSA).

18.
Computer system and network security by Gregory B White et al. by
  • White, Gregory B
Series: CRC Press computer engineering series
Material type: Text Book
Publication details: Boca Raton CRC Press 1996
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 N961.

19.
ASP/MTS/ADSI web security by Harrison by
  • Harrison
Material type: Text Book
Publication details: New Jersey Prentice Hall/PTR 2000
Availability: Items available for reference: JRD Tata Memorial Library: Not for loan (1)Call number: 005.71 P1 (BTIS).

20.
Secure computers and networks Analysis, design, and implementation by Eric A Fisch and Gregory B White by
  • Fisch, Eric A
  • White, Gregory B
Material type: Text Book
Publication details: Boca Raton CRC Press 2000
Availability: Items available for loan: JRD Tata Memorial Library (1)Call number: 005.8 P.

Pages

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2023. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832

Powered by Koha